Tomcat (8080)
Discovery
http://app-dev.inlanefreight.local:8080/invalid

Interesting Files
WEB-INF/web.xml
tomcat-users.xml
Enumeration
Wordlists
Password
tomcat::Tomcatadm
Tomcat Manager - Login Brute Force
mgr_brute.py
Tomcat Manager - WAR File Upload
Manually
jsp shell: https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/jsp/cmd.jsp
Browse to select the .war file and then click on Deploy.

Msfvenom
Metasploit
multi/http/tomcat_mgr_upload
Exploitation
Web ShellCVE-2025-24813 Apache Tomcat RCE
Apache Tomcat 11.0.0-M1 to 11.0.2
Apache Tomcat 10.1.0-M1 to 10.1.34
Apache Tomcat 9.0.0.M1 to 9.0.98
Upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.
or with Curl
CVE-2024-50379 - RCE
Time-of-Check Time-of-Use (TOCTOU) race condition that can lead to remote code execution (RCE) if the server's configuration allows writable directories.
Upload a JSP shell to a vulnerable server and execute commands remotely.
CVE-2024-52316 - Authentification Bypass
Apache Tomcat 11.0
Versions prior to 11.0.0
Apache Tomcat 10.1
Versions prior to 10.1.31
Apache Tomcat 9.0
Versions prior to 9.0.96
CVE-2024-40725 and CVE-2024-40898 - SSRF
Apache HTTP Server versions 2.4.0 through 2.4.61
CVE-2024-52318 - XSS
Apache Tomcat 11.0 Versions prior to 11.0.1 Apache Tomcat 10.1 Versions prior to 10.1.33 Apache Tomcat 9.0 Versions prior to 9.0.97
CVE-2024-52317 - Data Leakage
Apache Tomcat 11.0 Versions prior to 11.0.0 Apache Tomcat 10.1 Versions prior to 10.1.31 Apache Tomcat 9.0 Versions prior to 9.0.96
Ghostcat
The exploit can only read files and folders within the web apps folder, which means that files like /etc/passwd can’t be accessed.
python3 exploit:
Log4Shell
Spring4Shell
Tomcat CGI
Tomcat CGITools
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Resources
Last updated
